Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Developing Middleware in Java EE 8: Build robust middleware solutions using the latest technologies and trends
Developing Middleware in Java EE 8: Build robust middleware solutions using the latest technologies and trends

Use Java features such as JAX-RS, EJBs, and JPAs to build powerful middleware for newer architectures such as the cloud

Key Features

  • Explore EJBs to build middleware solutions for enterprise and distributed applications
  • Understand middleware designs such as event-based and...
Optimizing Applications on Cisco Networks
Optimizing Applications on Cisco Networks

Maximize the performance and availability of network applications and the network infrastructure with application performance management

  • Learn and understand the business case for application performance management

  • Understand how to...

JBoss Administration and Development, Second Edition
JBoss Administration and Development, Second Edition
The primary focus of this book is the presentation of the standard JBoss 3.0.3 architecture components from both the perspective of their configuration and architecture. As a user of a standard JBoss distribution you will be given an understanding of how to configure the standard components.

As a JBoss developer, you will be given a good
...
Principles of Embedded Networked Systems Design
Principles of Embedded Networked Systems Design
"...this volume represents a real mine of information...anyone working in the field would benefit from owning a copy." IEEE Communications Engineer

Embedded network systems (ENS) provide a set of technologies that can link the physical world to large-scale networks in applications, such as monitoring of borders,
...
Programming Windows
Programming Windows

NOTE: This book is based on Windows 8 Release Preview; its content and publication date will be updated for final Windows 8 software.

Reimagined for full-screen and touch-optimized apps, Windows 8 provides a platform for reaching new users in new ways. In response, programming legend Charles Petzold is rewriting his...

Software Maintenance Success Recipes
Software Maintenance Success Recipes

Dispelling much of the folklore surrounding software maintenance, Software Maintenance Success Recipes identifies actionable formulas for success based on in-depth analysis of more than 200 real-world maintenance projects. It details the set of factors that are usually present when effective software maintenance teams do...

Architecting Microsoft Azure Solutions – Exam Guide 70-535: A complete guide to passing the 70-535 Architecting Microsoft Azure Solutions exam
Architecting Microsoft Azure Solutions – Exam Guide 70-535: A complete guide to passing the 70-535 Architecting Microsoft Azure Solutions exam

Get certified as an Azure architect by acing the 70-535 Architecting Microsoft Solutions (70-535) exam using this comprehensive guide with full coverage of the exam objectives

Key Features

  • Learn to successfully design and architect powerful solutions on the Azure Cloud platform
  • ...
Japan’s Asian Diplomacy: Power Transition, Domestic Politics, and Diffusion of Ideas (Critical Studies of the Asia-Pacific)
Japan’s Asian Diplomacy: Power Transition, Domestic Politics, and Diffusion of Ideas (Critical Studies of the Asia-Pacific)

This book provides a comprehensive analysis of Japan’s Asian diplomacy under Prime Minister Shinz? Abe. Under the Kantei-centred policymaking system, Shinz? Abe has implemented assertive foreign policies with a slogan of ‘diplomacy taking a panoramic perspective of the world’. The analyses in...

Cisco IOS Essentials
Cisco IOS Essentials
Who cares about configuring network routers? Network routers are a major part of the glue that holds all computer networks together. Routers are supposed to configure themselves right? Not really. Routers aren’t to the point of being able to configure themselves, yet. They have no artificial intelligence agent so almost everything on them...
Transactional Memory (Synthesis Lectures on Computer Architecture)
Transactional Memory (Synthesis Lectures on Computer Architecture)
The advent of multicore processors has renewed interest in the idea of incorporating transactions into the programming model used to write parallel programs. This approach, known as transactional memory, offers an alternative, and hopefully better, way to coordinate concurrent threads. The ACI (atomicity, consistency, isolation) properties of...
Anti-Spam Measures: Analysis and Design
Anti-Spam Measures: Analysis and Design
The primary goal of this work is the methodical analysis of the potential, limitations, advantages, and drawbacks of anti-spam measures. These determine to which extent the measures can contribute to the reduction of spam in the long run. The range of considered anti-spam measures includes legislative, organizational, behavioral and technological...
Mastering System Center Configuration Manager 2007 R2
Mastering System Center Configuration Manager 2007 R2
Mastering System Center Configuration Manager 2007 provides intermediate and advanced coverage of all aspects of the product, including planning and installation, upgrading Systems Management Server 2003, deploying software and operating systems, security, monitoring and troubleshooting, and automating and customizing SCCM 2007 with scripts.
...
unlimited object storage image
Result Page: 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 76 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy